๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.8K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
โ€ผ CVE-2021-1546 โ€ผ

A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to access sensitive information. This vulnerability is due to improper protections on file access through the CLI. An attacker could exploit this vulnerability by running a CLI command that targets an arbitrary file on the local system. A successful exploit could allow the attacker to return portions of an arbitrary file, possibly resulting in the disclosure of sensitive information.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-34699 โ€ผ

A vulnerability in the TrustSec CLI parser of Cisco IOS and Cisco IOS XE Software could allow an authenticated, remote attacker to cause an affected device to reload. This vulnerability is due to an improper interaction between the web UI and the CLI parser. An attacker could exploit this vulnerability by requesting a particular CLI command to be run through the web UI. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-1419 โ€ผ

A vulnerability in the SSH management feature of multiple Cisco Access Points (APs) platforms could allow a local, authenticated user to modify files on the affected device and possibly gain escalated privileges. The vulnerability is due to improper checking on file operations within the SSH management interface. A network administrator user could exploit this vulnerability by accessing an affected device through SSH management to make a configuration change. A successful exploit could allow the attacker to gain privileges equivalent to the root user.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-1615 โ€ผ

A vulnerability in the packet processing functionality of Cisco Embedded Wireless Controller (EWC) Software for Catalyst Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected AP. This vulnerability is due to insufficient buffer allocation. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to exhaust available resources and cause a DoS condition on an affected AP, as well as a DoS condition for client traffic traversing the AP.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-1589 โ€ผ

A vulnerability in the disaster recovery feature of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain unauthorized access to user credentials. This vulnerability exists because access to API endpoints is not properly restricted. An attacker could exploit this vulnerability by sending a request to an API endpoint. A successful exploit could allow the attacker to gain unauthorized access to administrative credentials that could be used in further attacks.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-34724 โ€ผ

A vulnerability in the Cisco IOS XE SD-WAN Software CLI could allow an authenticated, local attacker to elevate privileges and execute arbitrary code on the underlying operating system as the root user. An attacker must be authenticated on an affected device as a PRIV15 user. This vulnerability is due to insufficient file system protection and the presence of a sensitive file in the bootflash directory on an affected device. An attacker could exploit this vulnerability by overwriting an installer file stored in the bootflash directory with arbitrary commands that can be executed with root-level privileges. A successful exploit could allow the attacker to read and write changes to the configuration database on the affected device.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-34726 โ€ผ

A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands to be executed with root-level privileges on the underlying operating system of an affected device. This vulnerability is due to insufficient input validation on certain CLI commands. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to execute commands with root-level privileges.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-34712 โ€ผ

A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct cypher query language injection attacks on an affected system. This vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the interface of an affected system. A successful exploit could allow the attacker to obtain sensitive information.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-34723 โ€ผ

A vulnerability in a specific CLI command that is run on Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to overwrite arbitrary files in the configuration database of an affected device. This vulnerability is due to insufficient validation of specific CLI command parameters. An attacker could exploit this vulnerability by issuing that command with specific parameters. A successful exploit could allow the attacker to overwrite the content of the configuration database and gain root-level access to an affected device.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-1623 โ€ผ

A vulnerability in the Simple Network Management Protocol (SNMP) punt handling function of Cisco cBR-8 Converged Broadband Routers could allow an authenticated, remote attacker to overload a device punt path, resulting in a denial of service (DoS) condition. This vulnerability is due to the punt path being overwhelmed by large quantities of SNMP requests. An attacker could exploit this vulnerability by sending a large number of SNMP requests to an affected device. A successful exploit could allow the attacker to overload the device punt path, resulting in a DoS condition.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ—“๏ธ Beego patches severe XSS vulnerability in open source web framework ๐Ÿ—“๏ธ

Security flaw allowed attackers to gain a foothold into a victimโ€™s network

๐Ÿ“– Read

via "The Daily Swig".
โŒ Large-Scale Phishing-as-a-Service Operation Exposed โŒ

Discovery of BulletProofLinkโ€”which provides phishing kits, email templates, hosting and other toolsโ€”sheds light on how wannabe cybercriminals can get into the business.

๐Ÿ“– Read

via "Threat Post".
๐Ÿ—“๏ธ Netgear fixes RCE flaw in routersโ€™ parental controls feature ๐Ÿ—“๏ธ

Bug in third-party code offers salutary lessons around enterprise risk management, say researchers

๐Ÿ“– Read

via "The Daily Swig".
โŒ Domain Brand Monitor: The First Brand Protection Layer by WhoisXML API โŒ

Domain names are often brands' most valuable and impersonated assets. Learn how Brand Monitor by WhoisXML API supports brand protection.

๐Ÿ“– Read

via "Threat Post".
โŒ Google Report Spotlights Uptick in Controversial โ€˜Geofence Warrantsโ€™ by Police โŒ

Digital privacy rights defenders contend that geofencing warrants grab data on everyone near a crime, without cause.

๐Ÿ“– Read

via "Threat Post".
โŒ Acronis Offers up to $5,000 to Users Who Spot Bugs in Its Cyber Protection Products โŒ

Once available only to the cybersecurity community, Acronis has opened its bug-hunting program to the public and aims to double the total bounties paid.

๐Ÿ“– Read

via "Threat Post".
โ™Ÿ๏ธ Indictment, Lawsuits Revive Trump-Alfa Bank Story โ™Ÿ๏ธ

In October 2016, media outlets reported that data collected by some of the world's most renowned cybersecurity experts had identified frequent and unexplained communications between an email server used by the Trump Organization and Alfa Bank, one of Russia's largest financial institutions. Those publications set off speculation about a possible secret back-channel of communications, as well as a series of lawsuits and investigations that culminated last week with the indictment of the same former federal cybercrime prosecutor who brought the data to the attention of the FBI five years ago.

๐Ÿ“– Read

via "Krebs on Security".
โ€ผ CVE-2021-22019 โ€ผ

The vCenter Server contains a denial-of-service vulnerability in VAPI (vCenter API) service. A malicious actor with network access to port 5480 on vCenter Server may exploit this issue by sending a specially crafted jsonrpc message to create a denial of service condition.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-22007 โ€ผ

The vCenter Server contains a local information disclosure vulnerability in the Analytics service. An authenticated user with non-administrative privilege may exploit this issue to gain access to sensitive information.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-22949 โ€ผ

A CSRF in Concrete CMS version 8.5.5 and below allows an attacker to duplicate files which can lead to UI inconvenience, and exhaustion of disk space.Credit for discovery: "Solar Security CMS Research Team"

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-22016 โ€ผ

The vCenter Server contains a reflected cross-site scripting vulnerability due to a lack of input sanitization. An attacker may exploit this issue to execute malicious scripts by tricking a victim into clicking a malicious link.

๐Ÿ“– Read

via "National Vulnerability Database".